EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated to ethical hackers, red teamers, blue teamers & security analysts.
☆24May 8, 2022Updated 3 years ago
Alternatives and similar repositories for EnumVolcano
Users that are interested in EnumVolcano are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness related…☆18Mar 25, 2022Updated 4 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Jul 21, 2015Updated 10 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24May 8, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Mar 29, 2016Updated 10 years ago
- Scan a host for open HTTP ports and gain information about the services present.☆12Jul 20, 2022Updated 3 years ago
- This is a termux sms booming tool☆11Aug 20, 2023Updated 2 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Oct 25, 2023Updated 2 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆46Nov 16, 2020Updated 5 years ago
- Resources for AD penetration testing and security☆33Feb 21, 2022Updated 4 years ago
- ssb=simple subdomain bruteforcer☆20Mar 10, 2023Updated 3 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Extensible MacOS system telemetry generator.☆56Updated this week
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆19May 23, 2022Updated 3 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- ☆13Apr 6, 2016Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Script that performs a scan of a specific domain, using the following tools: Subfinder, assetfinder, amass and httpx. The result is merge…☆24Apr 20, 2022Updated 3 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- ☆12Apr 20, 2025Updated 11 months ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Jul 6, 2024Updated last year
- Forblaze - A Python Mac Steganography Payload Generator☆56Mar 7, 2022Updated 4 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆23Feb 11, 2025Updated last year
- mift - a mobile image forensic toolkit☆47Nov 14, 2023Updated 2 years ago
- ☆20Apr 10, 2025Updated last year
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆32Jun 28, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- ☆10Aug 9, 2024Updated last year
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Mar 2, 2022Updated 4 years ago
- ☆10Sep 10, 2024Updated last year